US8301113B2 - Method for managing wireless devices using exception monitoring - Google Patents

Method for managing wireless devices using exception monitoring Download PDF

Info

Publication number
US8301113B2
US8301113B2 US11/734,001 US73400107A US8301113B2 US 8301113 B2 US8301113 B2 US 8301113B2 US 73400107 A US73400107 A US 73400107A US 8301113 B2 US8301113 B2 US 8301113B2
Authority
US
United States
Prior art keywords
usage
wireless devices
data
wireless device
usage policy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related, expires
Application number
US11/734,001
Other versions
US20080254763A1 (en
Inventor
Kenneth A. Brink, Jr.
Randy S. Johnson
Raymond T. Malkowski
Jeffrey H. Martin
Tedrick N. Northway
Patrick J. Richards, Jr.
Duane L. Winkler
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
International Business Machines Corp
Original Assignee
International Business Machines Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by International Business Machines Corp filed Critical International Business Machines Corp
Priority to US11/734,001 priority Critical patent/US8301113B2/en
Assigned to INTERNATIONAL BUSINESS MACHINES CORPORATION reassignment INTERNATIONAL BUSINESS MACHINES CORPORATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: BRINK, KENNETH A., JR., JOHNSON, RANDY S., MALKOWSKI, RAYMOND T., MARTIN, JEFFREY H., NORTHWAY, TEDRICK N., RICHARDS, PATRICK J., JR., WINKLER, DUANE L.
Publication of US20080254763A1 publication Critical patent/US20080254763A1/en
Application granted granted Critical
Publication of US8301113B2 publication Critical patent/US8301113B2/en
Expired - Fee Related legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M3/00Automatic or semi-automatic exchanges
    • H04M3/22Arrangements for supervision, monitoring or testing
    • H04M3/2281Call monitoring, e.g. for law enforcement purposes; Call tracing; Detection or prevention of malicious calls
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M17/00Prepayment of wireline communication systems, wireless communication systems or telephone systems

Definitions

  • aspects of the invention relate generally to a method for managing wireless devices, and more particularly, to a solution for using exception monitoring in the management of wireless devices.
  • wireless devices such as a mobile phone, a smartphone, a personal digital assistant (PDA), etc.
  • PDA personal digital assistant
  • usage of wireless devices has exploded in recent time. Although this tremendous increase in use has effected the individual owner, there are additional complications created for a group, organization, and/or company that are using wireless devices.
  • Wireless device users also require wireless device support, either live or self-help, for problem resolution.
  • Software updates are another requirement, keeping the wireless device up-to-date with the latest fixes and/or enhancements.
  • An illustrative scenario is a corporation, XYZ Corp. (XYZ), which requires mobile phones and PDA devices for employees.
  • XYZ contracts both with a cellular service provider, CP 1 , and with CP 2 , a mobile phone and PDA device provider.
  • Both CP 1 and CP 2 are to each provide services for corporate and personal employee usage of their respective wireless devices.
  • This requires XYZ and/or the employees to contact each provider (i.e., CP 1 , CP 2 ) for monthly usage, billing, support, etc.
  • a consideration in managing wireless devices is unacceptable use of the wireless devices. Unacceptable uses may include, for example, fraud, misuse, overrun in cost usage, unauthorized calls, unauthorized use of Internet, and/or the like. Efficiently managing, monitoring, and/or controlling unacceptable use in wireless devices is compounded by multiple wireless devices, multiple wireless device providers, multiple third party wireless carrier providers and/or the complexity and structure of the company itself.
  • aspects of the invention provide an improved solution for managing use of a plurality of wireless devices.
  • a usage policy is obtained for the plurality of wireless devices.
  • Usage data for one or more of the plurality of wireless devices is compared against the usage policy, wherefrom an exception report is derived and created.
  • the exception report is analyzed for non-compliance and a customer is notified.
  • a first aspect of the invention provides a method of managing use of a plurality of wireless devices, the method comprising: obtaining at least one usage policy for the plurality of wireless devices; comparing usage data for at least one of the plurality of wireless devices against the at least one usage policy; and creating an exception report, derived from the comparing.
  • a second aspect of the invention provides a system for managing use of a plurality of wireless devices, the system comprising: a system for obtaining at least one usage policy for the plurality of wireless devices; a system for comparing usage data for at least one of the plurality of wireless devices against the at least one usage policy; and a system for creating an exception report, derived from the comparing.
  • a third aspect of the invention provides a computer program comprising program code stored on a computer-readable medium, which when executed, enables a computer system to implement a method of managing use of a plurality of wireless devices, the method comprising: obtaining at least one usage policy for the plurality of wireless devices; comparing usage data for at least one of the plurality of wireless devices against the at least one usage policy; and creating an exception report, derived from the comparing.
  • a fourth aspect of the invention provides a method of generating a system for managing use of a plurality of wireless devices, the method comprising: providing a computer system operable to: obtain at least one usage policy for the plurality of wireless devices; compare usage data for at least one of the plurality of wireless devices against the at least one usage policy; and create an exception report, derived from the comparing.
  • a fifth aspect of the invention provides a data processing system for managing use of a plurality of wireless devices, comprising: a processing unit; a bus coupled to the processing unit; and a memory medium coupled to the bus comprising program code, which when executed by the processing unit causes the data processing system to: obtain at least one usage policy for the plurality of wireless devices; compare usage data for at least one of the plurality of wireless devices against the at least one usage policy; and create an exception report, derived from the comparing.
  • a sixth aspect of the invention provides computer software embodied in at least one propagated signal for managing use of a plurality of wireless devices, the at least one propagated signal comprising instructions for causing at least computer system to: obtain at least one usage policy for the plurality of wireless devices; compare usage data for at least one of the plurality of wireless devices against the at least one usage policy; and create an exception report, derived from the comparing.
  • a seventh aspect of the invention provides a business method for managing use of a plurality of wireless devices, the business method comprising managing a network that includes at least one computer system that performs the process described herein; and receiving payment based on the managing.
  • the illustrative aspects of the invention are designed to solve one or more of the problems herein described and/or one or more other problems not discussed.
  • FIG. 1 shows an illustrative environment for managing wireless devices using exception monitoring according to an embodiment of the invention.
  • FIG. 2 shows an illustrative data flow for managing wireless devices using the modules of the exception monitoring program shown in FIG. 1 according to an embodiment of the invention.
  • aspects of the invention provide an improved solution for managing wireless devices including the use of exception monitoring.
  • usage policies are obtained from, for example, the customer. These usage policies are then compared to a wireless device usage data, whereby an exception report is derived. In another embodiment, the exception report is analyzed for non-compliance and the customer is notified.
  • the term “set” means one or more (i.e., at least one) and the phrase “any solution” means any now known or later developed solution.
  • FIG. 1 shows an illustrative environment 10 for managing wireless devices 18 over a network according to an embodiment of the invention.
  • environment 10 includes a computer system 12 that can perform the process described herein in order to manage wireless devices 18 .
  • computer system 12 is shown including a computing device 14 that comprises an exception monitoring program 30 , which makes computing device 14 operable to manage wireless devices 18 by performing the process described herein.
  • Computing device 14 is shown including a processor 20 , a memory 22 A, an input/output (I/O) interface 24 , and a bus 26 . Further, computing device 14 is shown in communication with an external I/O device/resource 28 and a storage device 22 B.
  • processor 20 executes program code, such as exception monitoring program 30 , which is stored in a storage system, such as memory 22 A and/or storage device 22 B. While executing program code, processor 20 can read and/or write data, such as usage policy 50 , fraud patterns 52 , exception report 54 , and/or the like to/from memory 22 A, storage device 22 B, and/or I/O interface 24 .
  • Bus 26 provides a communications link between each of the components in computing device 14 .
  • I/O device 28 can comprise any device that transfers information between a user 16 and computing device 14 .
  • I/O device 28 can comprise a user I/O device to enable an individual user 16 to interact with computing device 14 and/or a communications device to enable a system user, such as a wireless device 18 , to communicate with computing device 14 using any type of communications link.
  • computing device 14 can comprise any general purpose computing article of manufacture capable of executing program code installed thereon.
  • computing device 14 and exception monitoring program 30 are only representative of various possible equivalent computing devices that may perform the process described herein.
  • the functionality provided by computing device 14 and exception monitoring program 30 can be implemented by a computing article of manufacture that includes any combination of general and/or specific purpose hardware and/or program code.
  • the program code and hardware can be created using standard programming and engineering techniques, respectively.
  • computer system 12 is only illustrative of various types of computer systems for implementing aspects of the invention.
  • computer system 12 comprises two or more computing devices that communicate over any type of communications link, such as a network, a shared memory, or the like, to perform the process described herein.
  • any type of communications link such as a network, a shared memory, or the like
  • one or more computing devices in computer system 12 can communicate with one or more other computing devices external to computer system 12 using any type of communications link.
  • the communications link can comprise any combination of various types of wired and/or wireless links; comprise any combination of one or more types of networks; and/or utilize any combination of various types of transmission techniques and protocols.
  • exception monitoring program 30 enables computer system 12 to manage a plurality of wireless devices 18 over a network.
  • exception monitoring program 30 is shown including an obtaining module 32 , a comparison module 34 , a reporting module 36 , an analyzing module 38 , and a notification module 40 . Operation of each of these modules is discussed further herein. However, it is understood that some of the various modules shown in FIG. 1 can be implemented independently, combined, and/or stored in memory of one or more separate computing devices that are included in computer system 12 . Further, it is understood that some of the modules and/or functionality may not be implemented, or additional modules and/or functionality may be included as part of computer system 12 .
  • the network can comprise any combination of public and/or private networks.
  • the network comprises a peer-to-peer (P2P) network.
  • the P2P network can comprise a private network and/or can comprise a public network, such as the Internet.
  • computer system 12 can comprise a peer in the P2P network and can share with other peers (not shown) on the P2P network. Additionally, computer system 12 can obtain shared content from one or more of the peers. It is understood that each peer can be configured similar to computer system 12 . The configuration of peers has not been shown for clarity.
  • Usage policy 50 , fraud patterns 52 , exception report 54 , and/or usage data 56 can comprise any type of electronic data.
  • usage policy 50 can comprise a single data file that includes electronic data stored in any compressed or uncompressed format.
  • usage policy 50 can be embodied in any number of data files and/or other storage solutions.
  • Fraud patterns 52 , exception reports 54 , and usage data 56 have similar possible compositions and configurations.
  • Usage policy 50 , fraud patterns 52 , exception reports 54 and/or usage data 56 can be shared between peers and/or user 16 using any solution.
  • computer system 12 can communicate/receive all of content 50 , 52 , 54 , 56 to/from a single peer or user 16 or can communicate/receive only a portion of content 50 , 52 , 54 , 56 to/from peer or user 16 while one or more other peers and/or user 16 provide other portion(s) of content 50 , 52 , 54 , 56 .
  • usage policy 50 , fraud patterns 52 , exception reports 54 , and/or usage data 56 may be provided by a customer and/or a third party.
  • FIG. 2 shows an illustrative data flow or method for using the modules of exception monitoring program 30 ( FIG. 1 ) according to an embodiment of the invention.
  • a customer e.g., corporation, company, partnership, group, organization, family, etc.
  • S 1 includes obtaining a usage policy 50 (e.g., customer's usage policy) regarding usage of wireless devices 18 using obtaining module 32 ( FIG. 1 ).
  • a usage policy 50 e.g., customer's usage policy
  • the usage policy 50 may be fixed or changed over time. It may include policies on what and/or who a wireless device 18 user (e.g., employee, consultant, temporary hire, etc.) is/is not allowed to contact (e.g., call, transmit to, etc.). For example, the wireless device 18 user, under the usage policy 50 , may not be allowed to contact certain recipients based on certain phone numbers, email addresses, and/or websites. These recipients may be undesirable based on that they are, for example, commercial competitors, non-work related contacts, ex-employees, fraudulent activities (e.g., gambling), criminals, and/or the like.
  • a wireless device 18 user e.g., employee, consultant, temporary hire, etc.
  • the wireless device 18 user under the usage policy 50 , may not be allowed to contact certain recipients based on certain phone numbers, email addresses, and/or websites. These recipients may be undesirable based on that they are, for example, commercial competitors, non-work related contacts, ex-employees, fraudulent activities (
  • the usage policy 50 may include not allowing a user to receive communication from certain senders based on certain phone numbers, email addresses, and/or websites.
  • the usage policy 50 may include restrictions on using the wireless device 18 based on date, time, and/or location of wireless device 18 during attempted use.
  • the usage policy 50 may include that wireless device 18 may only be used during work days, work hours, and/or to/from work locations. This type of restriction could, for example, prevent an employee from using the wireless device 18 during vacation, on Sundays, on sick days, and/or during non-work hours (e.g., at night, during lunch, etc.).
  • the usage policy 50 may include general usage restrictions on using the wireless device 18 based on, for example, total time usage (e.g., 2,000 minutes maximum) in a particular period of time (e.g., month, day, sales period, year, etc.).
  • the usage policy 50 is virtually limitless in its scope and scale. For example, perhaps a certain commercial competitor, Acme Inc., is an unacceptable communicant with the customer's wireless device 18 users. Acme may, for example, be purchased by the instant company that is employing methods herein. In such a case, the policy 50 may change so that future wireless device 18 communications to and/or from an Acme employee are allowable.
  • At least one aspect of the usage policy 50 is compared with wireless device 18 usage data 56 using comparison module 34 ( FIG. 1 ).
  • the usage data 56 may be provided by the customer and/or one or more service providers. Usage data 56 may include elements such as quantity of communications, type and/or content of communications, minutes of communications, costs of communications, and/or the like.
  • comparison module 34 obtains the usage data 56 directly by monitoring wireless device 18 usage suing any solution.
  • an exception report 54 is created by reporting module 36 ( FIG. 1 ).
  • the exception report 54 may be presented using any tangible medium of expression now known or later developed.
  • the exception report 54 may be presented on a graphical user interface (GUI) and/or in a printed, hard-copy format.
  • the exception report 54 may include information such as user identification information (e.g., name, position, address, etc.); wireless device 18 information (e.g., serial number, wireless device 18 type, service provider, wireless device 18 provider, etc); usage data 56 (e.g., minutes per call, time of call, number called, website contacted, etc.); usage policy 50 information; and/or the like.
  • a user 16 employing the method herein is able to more readily manage the use of wireless devices 18 .
  • the method and/or portions thereof may be employed in real-time, on a scheduled pattern (e.g., weekly, monthly, etc.), based on a “tripping” mechanism (e.g., budget value is exceeded), and/or on demand.
  • the method additionally comprises S 4 , wherein analyzing module 38 ( FIG. 1 ) analyzes exception report 54 for any non-compliance with usage policy 50 .
  • Analyzing module 37 can identify any type of non-compliance. For example, illustrative non-compliance such as excessive call minutes during non-work times; calling a competitor's phone number; the call(s) exceeded a time amount; calling a restricted phone number; accessing a restricted website; and/or the like. Further specific examples may be a first example: User 2383, in January, 2006, had 44 minutes of calls on a Saturday. A second example: User 9234, in January, 2006, called competitor's human resource phone and placed a 25 minute call. A third example: User 3495, in February 2006, accessed a 900 number call for 33 minutes. A fourth example: User 3872, in February 2006, accessed restricted website: www.competitor.com.
  • the method may comprise S 5 , wherein the customer is notified, via notification module 40 ( FIG. 1 ) of any non-compliance realized by analyzing module 38 ( FIG. 1 ). Notification may be presented on a graphical user interface (GUI), in a printed, hard-copy format, and/or the like. In this manner, the customer may take appropriate action if deemed warranted.
  • GUI graphical user interface
  • Each fraud pattern 52 can define an exception (e.g., non-compliance with usage policy 50 ).
  • Fraud patterns 52 may include data on various past activity either derived “in-house” (e.g., from past exception reports 54 ) and/or obtained from outside, third parties and/or from a customer.
  • service provider(s), wireless device providers, law enforcement entities, and/or the like may provide data suitable for more readily ascertaining unacceptable wireless device 18 use.
  • Fraud patterns 52 need not necessarily be legally fraudulent activity and therefore the use of the term “fraud” is not meant to be limiting.
  • the method may further comprise the comparison module 34 further comparing fraud patterns 52 to the wireless device 18 usage data 56 discussed herein. In this manner, the comparison of fraud patterns 52 and/or usage policy 50 against wireless device 18 usage data 56 produces a robust exception report 54 .
  • usage policy 50 can further include usage policy(ies) for credit card(s) 60 .
  • At least one usage policy for a credit card 60 may be obtained.
  • Credit card 60 usage data for the credit card 60 is also obtained.
  • the usage policy for the credit card 60 is compared to the credit card 60 usage data by comparison module 34 ( FIG. 1 ).
  • Comparison module 34 may further compare the usage policy 50 with credit card 60 usage.
  • Resultant exception report 54 derived by reporting module 36 ( FIG. 1 ) includes various comparison data.
  • Credit card 60 usage may, for example, provide dollar amount, vendor use, dates, times, and/or the like.
  • the invention provides a computer program stored on a computer-readable medium, which when executed, enables a computer system to manage wireless devices 18 for a customer.
  • the computer-readable medium includes program code, such as exception monitoring program 30 ( FIG. 1 ), which implements the process described herein.
  • exception monitoring program 30 FIG. 1
  • the term “computer-readable medium” comprises one or more of any type of tangible medium of expression capable of embodying a copy of the program code (e.g., a physical embodiment).
  • the computer-readable medium can comprise program code embodied on one or more portable storage articles of manufacture, on one or more data storage portions of a computing device, such as memory 22 A ( FIG. 1 ) and/or storage system 22 B ( FIG. 1 ), as a data signal traveling over a network (e.g., during a wired/wireless electronic distribution of the computer program), on paper (e.g., capable of being scanned and converted to electronic data), and/or the like.
  • a network e.g., during a wired/wireless electronic distribution of the computer program
  • paper e.g., capable of being scanned and converted to electronic data
  • the invention provides a method of generating a system for managing wireless devices 18 for a customer.
  • a computer system such as computer system 12 ( FIG. 1 )
  • one or more programs/systems for performing the process described herein can be obtained (e.g., created, purchased, used, modified, etc.) and deployed to the computer system.
  • the deployment can comprise one or more of: (1) installing program code on a computing device, such as computing device 14 ( FIG. 1 ), from a computer-readable medium; (2) adding one or more computing devices to the computer system; and (3) incorporating and/or modifying one or more existing devices of the computer system, to enable the computer system to perform the process described herein.
  • the invention provides a business method that manages wireless devices 18 for a customer, which enables users to perform the process described herein on a subscription, advertising, and/or fee basis. That is, a service provider could offer to manage a network and/or a computer system 12 ( FIG. 1 ) that manages wireless devices 18 for a customer as described herein.
  • the service provider can manage (e.g., create, maintain, support, etc.) a virtual and/or physical network that enables users to communicate content using computer systems, such as computer system 12 , that perform the process described herein.
  • the service provider can receive payment from the user(s) under a subscription and/or fee agreement, receive payment from the sale of advertising to one or more third parties, and/or the like.
  • program code means any set of statements or instructions, in any language, code or notation, that cause a computing device having an information processing capability to perform a particular function either directly or after any combination of the following: (a) conversion to another language, code or notation; (b) reproduction in a different material form; and/or (c) decompression.
  • program code can be embodied as any combination of one or more types of computer programs, such as an application/software program, component software/a library of functions, an operating system, a basic I/O system/driver for a particular computing, storage and/or I/O device, and the like.

Abstract

An improved solution for managing use of a plurality of wireless devices is provided. In an embodiment of the invention, a usage policy is obtained for the plurality of wireless devices. Usage data for one or more of the plurality of wireless devices is compared against the usage policy, wherefrom an exception report is derived and created. In another embodiment, the exception report is analyzed for non-compliance and a customer is notified.

Description

FIELD OF THE INVENTION
Aspects of the invention relate generally to a method for managing wireless devices, and more particularly, to a solution for using exception monitoring in the management of wireless devices.
BACKGROUND OF THE INVENTION
Usage of wireless devices such as a mobile phone, a smartphone, a personal digital assistant (PDA), etc. has exploded in recent time. Although this tremendous increase in use has effected the individual owner, there are additional complications created for a group, organization, and/or company that are using wireless devices. As the types, number, and usage of wireless devices continues to increase, it becomes critical for a company to better manage aspects of the wireless devices, such as the number and/or types of wireless devices, as well as to accurately track charges, such as monthly utilization, to actual cost. Companies also find a requirement to help ensure that costs/billing be applied to a particular division, department, and/or individual level. Other important issues include keeping and tracking available information on the asset(s), such as what manufacturer, model, and/or software is installed, and how the wireless device is configured. Wireless device users also require wireless device support, either live or self-help, for problem resolution. Software updates are another requirement, keeping the wireless device up-to-date with the latest fixes and/or enhancements.
An illustrative scenario is a corporation, XYZ Corp. (XYZ), which requires mobile phones and PDA devices for employees. As such, XYZ contracts both with a cellular service provider, CP1, and with CP2, a mobile phone and PDA device provider. Both CP1 and CP2 are to each provide services for corporate and personal employee usage of their respective wireless devices. This requires XYZ and/or the employees to contact each provider (i.e., CP1, CP2) for monthly usage, billing, support, etc. Certainly with any size company, but in particular with large companies, because of the vast quantities of wireless devices and the use thereof, and/or the globalization of a company, suitable and efficient management of the wireless devices has quickly become less attainable.
A consideration in managing wireless devices is unacceptable use of the wireless devices. Unacceptable uses may include, for example, fraud, misuse, overrun in cost usage, unauthorized calls, unauthorized use of Internet, and/or the like. Efficiently managing, monitoring, and/or controlling unacceptable use in wireless devices is compounded by multiple wireless devices, multiple wireless device providers, multiple third party wireless carrier providers and/or the complexity and structure of the company itself.
In view of the foregoing, a need exists to overcome one or more of the deficiencies in the related art.
SUMMARY OF THE INVENTION
Aspects of the invention provide an improved solution for managing use of a plurality of wireless devices. In an embodiment of the invention, a usage policy is obtained for the plurality of wireless devices. Usage data for one or more of the plurality of wireless devices is compared against the usage policy, wherefrom an exception report is derived and created. In another embodiment, the exception report is analyzed for non-compliance and a customer is notified.
A first aspect of the invention provides a method of managing use of a plurality of wireless devices, the method comprising: obtaining at least one usage policy for the plurality of wireless devices; comparing usage data for at least one of the plurality of wireless devices against the at least one usage policy; and creating an exception report, derived from the comparing.
A second aspect of the invention provides a system for managing use of a plurality of wireless devices, the system comprising: a system for obtaining at least one usage policy for the plurality of wireless devices; a system for comparing usage data for at least one of the plurality of wireless devices against the at least one usage policy; and a system for creating an exception report, derived from the comparing.
A third aspect of the invention provides a computer program comprising program code stored on a computer-readable medium, which when executed, enables a computer system to implement a method of managing use of a plurality of wireless devices, the method comprising: obtaining at least one usage policy for the plurality of wireless devices; comparing usage data for at least one of the plurality of wireless devices against the at least one usage policy; and creating an exception report, derived from the comparing.
A fourth aspect of the invention provides a method of generating a system for managing use of a plurality of wireless devices, the method comprising: providing a computer system operable to: obtain at least one usage policy for the plurality of wireless devices; compare usage data for at least one of the plurality of wireless devices against the at least one usage policy; and create an exception report, derived from the comparing.
A fifth aspect of the invention provides a data processing system for managing use of a plurality of wireless devices, comprising: a processing unit; a bus coupled to the processing unit; and a memory medium coupled to the bus comprising program code, which when executed by the processing unit causes the data processing system to: obtain at least one usage policy for the plurality of wireless devices; compare usage data for at least one of the plurality of wireless devices against the at least one usage policy; and create an exception report, derived from the comparing.
A sixth aspect of the invention provides computer software embodied in at least one propagated signal for managing use of a plurality of wireless devices, the at least one propagated signal comprising instructions for causing at least computer system to: obtain at least one usage policy for the plurality of wireless devices; compare usage data for at least one of the plurality of wireless devices against the at least one usage policy; and create an exception report, derived from the comparing.
A seventh aspect of the invention provides a business method for managing use of a plurality of wireless devices, the business method comprising managing a network that includes at least one computer system that performs the process described herein; and receiving payment based on the managing.
The illustrative aspects of the invention are designed to solve one or more of the problems herein described and/or one or more other problems not discussed.
BRIEF DESCRIPTION OF THE DRAWINGS
These and other features of the invention will be more readily understood from the following detailed description of the various aspects of the invention taken in conjunction with the accompanying drawings that depict various embodiments of the invention, in which:
FIG. 1 shows an illustrative environment for managing wireless devices using exception monitoring according to an embodiment of the invention.
FIG. 2 shows an illustrative data flow for managing wireless devices using the modules of the exception monitoring program shown in FIG. 1 according to an embodiment of the invention.
It is noted that the drawings are not to scale. The drawings are intended to depict only typical aspects of the invention, and therefore should not be considered as limiting the scope of the invention. In the drawings, like numbering represents like elements between the drawings.
DETAILED DESCRIPTION OF THE INVENTION
As indicated above, aspects of the invention provide an improved solution for managing wireless devices including the use of exception monitoring. In an embodiment of the invention, usage policies are obtained from, for example, the customer. These usage policies are then compared to a wireless device usage data, whereby an exception report is derived. In another embodiment, the exception report is analyzed for non-compliance and the customer is notified. As used herein, unless otherwise noted, the term “set” means one or more (i.e., at least one) and the phrase “any solution” means any now known or later developed solution.
Turning to the drawings, FIG. 1 shows an illustrative environment 10 for managing wireless devices 18 over a network according to an embodiment of the invention. To this extent, environment 10 includes a computer system 12 that can perform the process described herein in order to manage wireless devices 18. In particular, computer system 12 is shown including a computing device 14 that comprises an exception monitoring program 30, which makes computing device 14 operable to manage wireless devices 18 by performing the process described herein.
Computing device 14 is shown including a processor 20, a memory 22A, an input/output (I/O) interface 24, and a bus 26. Further, computing device 14 is shown in communication with an external I/O device/resource 28 and a storage device 22B. In general, processor 20 executes program code, such as exception monitoring program 30, which is stored in a storage system, such as memory 22A and/or storage device 22B. While executing program code, processor 20 can read and/or write data, such as usage policy 50, fraud patterns 52, exception report 54, and/or the like to/from memory 22A, storage device 22B, and/or I/O interface 24. Bus 26 provides a communications link between each of the components in computing device 14. I/O device 28 can comprise any device that transfers information between a user 16 and computing device 14. To this extent, I/O device 28 can comprise a user I/O device to enable an individual user 16 to interact with computing device 14 and/or a communications device to enable a system user, such as a wireless device 18, to communicate with computing device 14 using any type of communications link.
In any event, computing device 14 can comprise any general purpose computing article of manufacture capable of executing program code installed thereon. However, it is understood that computing device 14 and exception monitoring program 30 are only representative of various possible equivalent computing devices that may perform the process described herein. To this extent, in other embodiments, the functionality provided by computing device 14 and exception monitoring program 30 can be implemented by a computing article of manufacture that includes any combination of general and/or specific purpose hardware and/or program code. In each embodiment, the program code and hardware can be created using standard programming and engineering techniques, respectively.
Similarly, computer system 12 is only illustrative of various types of computer systems for implementing aspects of the invention. For example, in one embodiment, computer system 12 comprises two or more computing devices that communicate over any type of communications link, such as a network, a shared memory, or the like, to perform the process described herein. Further, while performing the process described herein, one or more computing devices in computer system 12 can communicate with one or more other computing devices external to computer system 12 using any type of communications link. In either case, the communications link can comprise any combination of various types of wired and/or wireless links; comprise any combination of one or more types of networks; and/or utilize any combination of various types of transmission techniques and protocols.
As discussed herein, exception monitoring program 30 enables computer system 12 to manage a plurality of wireless devices 18 over a network. To this extent, exception monitoring program 30 is shown including an obtaining module 32, a comparison module 34, a reporting module 36, an analyzing module 38, and a notification module 40. Operation of each of these modules is discussed further herein. However, it is understood that some of the various modules shown in FIG. 1 can be implemented independently, combined, and/or stored in memory of one or more separate computing devices that are included in computer system 12. Further, it is understood that some of the modules and/or functionality may not be implemented, or additional modules and/or functionality may be included as part of computer system 12.
Regardless, aspects of the invention provide a solution for managing wireless devices 18 over a network. The network can comprise any combination of public and/or private networks. In an embodiment of the invention, the network comprises a peer-to-peer (P2P) network. The P2P network can comprise a private network and/or can comprise a public network, such as the Internet. In any event, computer system 12 can comprise a peer in the P2P network and can share with other peers (not shown) on the P2P network. Additionally, computer system 12 can obtain shared content from one or more of the peers. It is understood that each peer can be configured similar to computer system 12. The configuration of peers has not been shown for clarity.
Usage policy 50, fraud patterns 52, exception report 54, and/or usage data 56 (e.g., content) can comprise any type of electronic data. For example, usage policy 50 can comprise a single data file that includes electronic data stored in any compressed or uncompressed format. However, it is understood that usage policy 50 can be embodied in any number of data files and/or other storage solutions. Fraud patterns 52, exception reports 54, and usage data 56 have similar possible compositions and configurations. Usage policy 50, fraud patterns 52, exception reports 54 and/or usage data 56 can be shared between peers and/or user 16 using any solution. For example, in a P2P network, computer system 12 can communicate/receive all of content 50, 52, 54, 56 to/from a single peer or user 16 or can communicate/receive only a portion of content 50, 52, 54, 56 to/from peer or user 16 while one or more other peers and/or user 16 provide other portion(s) of content 50, 52, 54, 56. Further, usage policy 50, fraud patterns 52, exception reports 54, and/or usage data 56 may be provided by a customer and/or a third party.
Aspects of the invention provide an improved solution for managing wireless devices 18 for a customer. To this extent, FIG. 2 shows an illustrative data flow or method for using the modules of exception monitoring program 30 (FIG. 1) according to an embodiment of the invention. For example, a customer (e.g., corporation, company, partnership, group, organization, family, etc.) may desire to improve an overall management (e.g., control and monitoring) of a plurality of wireless devices 18 (FIG. 1) under its auspices. As such, under an embodiment of the invention, a method may be employed wherein S1 includes obtaining a usage policy 50 (e.g., customer's usage policy) regarding usage of wireless devices 18 using obtaining module 32 (FIG. 1). The usage policy 50 may be fixed or changed over time. It may include policies on what and/or who a wireless device 18 user (e.g., employee, consultant, temporary hire, etc.) is/is not allowed to contact (e.g., call, transmit to, etc.). For example, the wireless device 18 user, under the usage policy 50, may not be allowed to contact certain recipients based on certain phone numbers, email addresses, and/or websites. These recipients may be undesirable based on that they are, for example, commercial competitors, non-work related contacts, ex-employees, fraudulent activities (e.g., gambling), criminals, and/or the like. Similarly, the usage policy 50 may include not allowing a user to receive communication from certain senders based on certain phone numbers, email addresses, and/or websites. Similarly, the usage policy 50 may include restrictions on using the wireless device 18 based on date, time, and/or location of wireless device 18 during attempted use. For example, the usage policy 50 may include that wireless device 18 may only be used during work days, work hours, and/or to/from work locations. This type of restriction could, for example, prevent an employee from using the wireless device 18 during vacation, on Sundays, on sick days, and/or during non-work hours (e.g., at night, during lunch, etc.). Similarly, the usage policy 50 may include general usage restrictions on using the wireless device 18 based on, for example, total time usage (e.g., 2,000 minutes maximum) in a particular period of time (e.g., month, day, sales period, year, etc.).
The usage policy 50 is virtually limitless in its scope and scale. For example, perhaps a certain commercial competitor, Acme Inc., is an unacceptable communicant with the customer's wireless device 18 users. Acme may, for example, be purchased by the instant company that is employing methods herein. In such a case, the policy 50 may change so that future wireless device 18 communications to and/or from an Acme employee are allowable.
In any event, in S2, at least one aspect of the usage policy 50 is compared with wireless device 18 usage data 56 using comparison module 34 (FIG. 1). The usage data 56 may be provided by the customer and/or one or more service providers. Usage data 56 may include elements such as quantity of communications, type and/or content of communications, minutes of communications, costs of communications, and/or the like. In an alternative embodiment, comparison module 34 obtains the usage data 56 directly by monitoring wireless device 18 usage suing any solution.
In S3, an exception report 54 is created by reporting module 36 (FIG. 1). The exception report 54 may be presented using any tangible medium of expression now known or later developed. For example, the exception report 54 may be presented on a graphical user interface (GUI) and/or in a printed, hard-copy format. The exception report 54 may include information such as user identification information (e.g., name, position, address, etc.); wireless device 18 information (e.g., serial number, wireless device 18 type, service provider, wireless device 18 provider, etc); usage data 56 (e.g., minutes per call, time of call, number called, website contacted, etc.); usage policy 50 information; and/or the like. In this manner, a user 16 employing the method herein is able to more readily manage the use of wireless devices 18. The method and/or portions thereof may be employed in real-time, on a scheduled pattern (e.g., weekly, monthly, etc.), based on a “tripping” mechanism (e.g., budget value is exceeded), and/or on demand.
In an embodiment, the method additionally comprises S4, wherein analyzing module 38 (FIG. 1) analyzes exception report 54 for any non-compliance with usage policy 50. Analyzing module 37 can identify any type of non-compliance. For example, illustrative non-compliance such as excessive call minutes during non-work times; calling a competitor's phone number; the call(s) exceeded a time amount; calling a restricted phone number; accessing a restricted website; and/or the like. Further specific examples may be a first example: User 2383, in January, 2006, had 44 minutes of calls on a Saturday. A second example: User 9234, in January, 2006, called competitor's human resource phone and placed a 25 minute call. A third example: User 3495, in February 2006, accessed a 900 number call for 33 minutes. A fourth example: User 3872, in February 2006, accessed restricted website: www.competitor.com.
Additionally, the method may comprise S5, wherein the customer is notified, via notification module 40 (FIG. 1) of any non-compliance realized by analyzing module 38 (FIG. 1). Notification may be presented on a graphical user interface (GUI), in a printed, hard-copy format, and/or the like. In this manner, the customer may take appropriate action if deemed warranted.
In another embodiment, additional use of captured fraud patterns 52 may be employed. Each fraud pattern 52 can define an exception (e.g., non-compliance with usage policy 50). Fraud patterns 52 may include data on various past activity either derived “in-house” (e.g., from past exception reports 54) and/or obtained from outside, third parties and/or from a customer. For example, service provider(s), wireless device providers, law enforcement entities, and/or the like may provide data suitable for more readily ascertaining unacceptable wireless device 18 use. Fraud patterns 52 need not necessarily be legally fraudulent activity and therefore the use of the term “fraud” is not meant to be limiting.
In any event, if a fraud pattern 52 is employed, the method may further comprise the comparison module 34 further comparing fraud patterns 52 to the wireless device 18 usage data 56 discussed herein. In this manner, the comparison of fraud patterns 52 and/or usage policy 50 against wireless device 18 usage data 56 produces a robust exception report 54.
In still another embodiment of the invention, the additional monitoring of a set of credit cards 60 (FIG. 1) may be utilized. In this manner, usage policy 50 can further include usage policy(ies) for credit card(s) 60. At least one usage policy for a credit card 60 may be obtained. Credit card 60 usage data for the credit card 60 is also obtained. The usage policy for the credit card 60 is compared to the credit card 60 usage data by comparison module 34 (FIG. 1). Comparison module 34 may further compare the usage policy 50 with credit card 60 usage. Resultant exception report 54 derived by reporting module 36 (FIG. 1) includes various comparison data. Credit card 60 usage may, for example, provide dollar amount, vendor use, dates, times, and/or the like.
While shown and described herein as a method and system for managing wireless devices 18 for a customer, it is understood that the invention further provides various alternative embodiments. For example, in one embodiment, the invention provides a computer program stored on a computer-readable medium, which when executed, enables a computer system to manage wireless devices 18 for a customer. To this extent, the computer-readable medium includes program code, such as exception monitoring program 30 (FIG. 1), which implements the process described herein. It is understood that the term “computer-readable medium” comprises one or more of any type of tangible medium of expression capable of embodying a copy of the program code (e.g., a physical embodiment). In particular, the computer-readable medium can comprise program code embodied on one or more portable storage articles of manufacture, on one or more data storage portions of a computing device, such as memory 22A (FIG. 1) and/or storage system 22B (FIG. 1), as a data signal traveling over a network (e.g., during a wired/wireless electronic distribution of the computer program), on paper (e.g., capable of being scanned and converted to electronic data), and/or the like.
In another embodiment, the invention provides a method of generating a system for managing wireless devices 18 for a customer. In this case, a computer system, such as computer system 12 (FIG. 1), can be obtained (e.g., created, maintained, having made available to, etc.) and one or more programs/systems for performing the process described herein can be obtained (e.g., created, purchased, used, modified, etc.) and deployed to the computer system. To this extent, the deployment can comprise one or more of: (1) installing program code on a computing device, such as computing device 14 (FIG. 1), from a computer-readable medium; (2) adding one or more computing devices to the computer system; and (3) incorporating and/or modifying one or more existing devices of the computer system, to enable the computer system to perform the process described herein.
In still another embodiment, the invention provides a business method that manages wireless devices 18 for a customer, which enables users to perform the process described herein on a subscription, advertising, and/or fee basis. That is, a service provider could offer to manage a network and/or a computer system 12 (FIG. 1) that manages wireless devices 18 for a customer as described herein. In this case, the service provider can manage (e.g., create, maintain, support, etc.) a virtual and/or physical network that enables users to communicate content using computer systems, such as computer system 12, that perform the process described herein. In return, the service provider can receive payment from the user(s) under a subscription and/or fee agreement, receive payment from the sale of advertising to one or more third parties, and/or the like.
As used herein, it is understood that “program code” means any set of statements or instructions, in any language, code or notation, that cause a computing device having an information processing capability to perform a particular function either directly or after any combination of the following: (a) conversion to another language, code or notation; (b) reproduction in a different material form; and/or (c) decompression. To this extent, program code can be embodied as any combination of one or more types of computer programs, such as an application/software program, component software/a library of functions, an operating system, a basic I/O system/driver for a particular computing, storage and/or I/O device, and the like.
The foregoing description of various aspects of the invention has been presented for purposes of illustration and description. It is not intended to be exhaustive or to limit the invention to the precise form disclosed, and obviously, many modifications and variations are possible. Such modifications and variations that may be apparent to an individual in the art are included within the scope of the invention as defined by the accompanying claims.

Claims (22)

1. A computerized method of managing use of a plurality of wireless devices owned by a customer, the method comprising:
using a computer system including at least one computer device to obtain at least one usage policy for the plurality of wireless devices, wherein the at least one usage policy is set by the customer and includes rules for voice and data use of the plurality of wireless devices, wherein the rules include at least one of the following: restrictions as to third parties a user of a wireless device can contact, restrictions as to third parties a user of a wireless device can receive a communication from, and restrictions on use of a wireless device based on date, time or location of the wireless device during attempted use;
using the computer system to compare usage data for at least one of the plurality of wireless devices against the at least one usage policy to determine at least one violation of the usage policy by the usage data for at least one of the plurality of wireless devices;
using the computer system to create an exception report, derived from the comparing, wherein the exception report includes user identification information for the at least one of the plurality of wireless devices, wireless device and wireless device provider information for the at least one of the plurality of wireless devices, the usage data, the at least one usage policy and the at least one violation of the usage policy by the usage data; and
using the computer system to present the exception report to a user.
2. The method of claim 1, further comprising using the computer system to notify the customer of the non-compliance.
3. The method of claim 1, further comprising using the computer system to obtain at least one fraud pattern defining an exception and using the computer system to compare the at least one fraud pattern to the usage data.
4. The method of claim 1, further comprising using the computer system to present the exception report in one of a graphical user interface (GUI) and a printed report.
5. The method of claim 1, further comprising using the computer system to monitor wireless device usage to obtain the usage data.
6. The method of claim 1, the method further comprising:
using the computer system to obtain at least one usage policy for a credit card owned by the customer;
using the computer system to obtain credit card usage data for the credit card; and
using the computer system to compare the at least one usage policy for the credit card to the credit card usage data.
7. The method of claim 1, wherein the at least one usage policy includes dissemination of data to an unauthorized recipient of data.
8. The method of claim 1, wherein the at least one usage policy includes receipt of data from an unauthorized sender of data.
9. The method of claim 1, wherein at least one of:
the plurality of wireless devices are supplied by a plurality of providers; or the
usage data is obtained from a plurality of providers.
10. A system for managing use of a plurality of wireless devices owned by a customer, the system for managing comprising:
a system for obtaining at least one usage policy for the plurality of wireless devices, wherein the at least one usage policy is set by the customer and includes rules for voice and data use of the plurality of wireless devices, wherein the rules include at least one of the following: restrictions as to third parties a user of a wireless device can contact, restrictions as to third parties a user of a wireless device can receive a communication from, and restrictions on use of a wireless device based on date, time or location of the wireless device during attempted use;
a system for comparing usage data for at least one of the plurality of wireless devices against the at least one usage policy to determine at least one violation of the usage policy by the usage data for at least one of the plurality of wireless devices
a system for creating an exception report, derived from the comparing, wherein the exception report includes user identification information for the at least one of the plurality of wireless devices, wireless device and wireless device provider information for the at least one of the plurality of wireless devices, the usage data, the at least one usage policy and the at least one violation of the usage policy by the usage data; and
a system for presenting the exception report to a user.
11. The system for managing of claim 10, further comprising a system for notifying the customer of the non-compliance.
12. The system for managing of claim 10, further comprising a system for obtaining at least one fraud pattern defining an exception and a system for comparing the at least one fraud pattern to the usage data.
13. The system for managing of claim 10, further comprising a system for monitoring wireless device usage, thereby obtaining the usage data.
14. The system for managing of claim 10, the system for managing further comprising:
a system for obtaining at least one usage policy for a credit card owned by the customer;
a system for obtaining credit card usage data for the credit card; and
a system for comparing the at least one usage policy for the credit card to the credit card usage data.
15. The system for managing of claim 10, wherein the at least one usage policy includes using the computer system to disseminate data to an unauthorized recipient of data.
16. The system for managing of claim 10, wherein the at least one usage policy includes receipt of data on the computer system from an unauthorized sender of data.
17. The system for managing of claim 10, wherein at least one of:
the plurality of wireless devices are supplied by a plurality of providers; or
the usage data is obtained from a plurality of providers.
18. A computer program comprising program code stored on a non-transitory computer-readable storage medium, which when executed, enables a computer system to implement a method of managing use of a plurality of wireless devices owned by a customer, the method comprising:
obtaining at least one usage policy for the plurality of wireless devices, wherein the at least one usage policy is set by the customer and includes rules for voice and data use of the plurality of wireless devices, wherein the rules include at least one of the following: restrictions as to third parties a user of a wireless device can contact, restrictions as to third parties a user of a wireless device can receive a communication from, and restrictions on use of a wireless device based on date, time or location of the wireless device during attempted use;
comparing usage data for at least one of the plurality of wireless devices against the at least one usage policy to determine at least one violation of the usage policy by the usage data for at least one of the plurality of wireless devices;
creating an exception report, derived from the comparing, wherein the exception report includes user identification information for the at least one of the plurality of wireless devices, wireless device and wireless device provider information for the at least one of the plurality of wireless devices, the usage data, the at least one usage policy and the at least one violation of the usage policy by the usage data; and
presenting the exception report to a user.
19. A method of generating a system for managing use of a plurality of wireless devices owned by a customer, the method comprising:
providing a computer system operable to:
obtain at least one usage policy for the plurality of wireless devices, wherein the at least one usage policy is set by the customer and includes rules for voice and data use of the plurality of wireless devices, wherein the rules include at least one of the following: restrictions as to third parties a user of a wireless device can contact, restrictions as to third parties a user of a wireless device can receive a communication from, and restrictions on use of a wireless device based on date, time or location of the wireless device during attempted use;
compare usage data for at least one of the plurality of wireless devices against the at least one usage policy to determine at least one violation of the usage policy by the usage data for at least one of the plurality of wireless devices;
create an exception report, derived from the comparing, wherein the exception report includes user identification information for the at least one of the plurality of wireless devices, wireless device and wireless device provider information for the at least one of the plurality of wireless devices, the usage data, the at least one usage policy and the at least one violation of the usage policy by the usage data; and
present the exception report to a user.
20. The method of claim 19, wherein the computer system is further operable to:
obtain at least one fraud pattern defining an exception, and
compare the at least one fraud pattern to the usage data.
21. The method of claim 19, wherein the computer system is further operable to:
obtain at least one usage policy for a credit card owned by the customer;
obtain credit card usage data for the credit card; and
compare the at least one usage policy for the credit card to the credit card usage data.
22. The method of claim 19, wherein at least one of:
the plurality of wireless devices are supplied by a plurality of providers; or the
usage data is obtained from a plurality of providers.
US11/734,001 2007-04-11 2007-04-11 Method for managing wireless devices using exception monitoring Expired - Fee Related US8301113B2 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/734,001 US8301113B2 (en) 2007-04-11 2007-04-11 Method for managing wireless devices using exception monitoring

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
US11/734,001 US8301113B2 (en) 2007-04-11 2007-04-11 Method for managing wireless devices using exception monitoring

Publications (2)

Publication Number Publication Date
US20080254763A1 US20080254763A1 (en) 2008-10-16
US8301113B2 true US8301113B2 (en) 2012-10-30

Family

ID=39854165

Family Applications (1)

Application Number Title Priority Date Filing Date
US11/734,001 Expired - Fee Related US8301113B2 (en) 2007-04-11 2007-04-11 Method for managing wireless devices using exception monitoring

Country Status (1)

Country Link
US (1) US8301113B2 (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100017889A1 (en) * 2008-07-17 2010-01-21 Symantec Corporation Control of Website Usage Via Online Storage of Restricted Authentication Credentials
US20100121744A1 (en) * 2008-11-07 2010-05-13 At&T Intellectual Property I, L.P. Usage data monitoring and communication between multiple devices
JP2014502383A (en) * 2010-10-04 2014-01-30 ヘッドウォーター パートナーズ I エルエルシー System and method for provisioning user notifications
US9713194B2 (en) * 2011-12-28 2017-07-18 United States Cellular Corporation System and method for data network reassignment
US10382486B2 (en) * 2012-09-28 2019-08-13 Tripwire, Inc. Event integration frameworks
WO2015059715A2 (en) * 2013-10-21 2015-04-30 Subex Limited Method and system for revenue maximization in a communication network

Citations (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6256515B1 (en) 1998-04-29 2001-07-03 Metro One Telecommunications, Inc. Call management system for wireless telephones
US6308053B1 (en) 1997-06-19 2001-10-23 Byard G. Nilsson Recyclable wireless telephone unit with a secured activation switch
US6308067B1 (en) 1999-11-30 2001-10-23 At&T Corp. Wireless communications system and method of operation for reducing fraud
US20020081995A1 (en) 2000-12-21 2002-06-27 Mika Leppinen Secure wireless backup mechanism
US20020154751A1 (en) * 2000-10-18 2002-10-24 Thompson Richard H. Method for managing wireless communication device use including optimizing rate and service plan selection
US6687496B1 (en) 2000-08-02 2004-02-03 Intel Corporation Memory programming method and system
US20040063463A1 (en) 2002-09-30 2004-04-01 Roger Boivin Multiple piece wireless phone
US20040067747A1 (en) * 2002-10-02 2004-04-08 Carpenter Ronald Vaiden Method for managing wireless telecommunications bills
US6847970B2 (en) 2002-09-11 2005-01-25 International Business Machines Corporation Methods and apparatus for managing dependencies in distributed systems
US20050041648A1 (en) 2003-08-18 2005-02-24 Nortel Networks Limited Method and system for service denial and termination on a wireless network
US20050054324A1 (en) 2003-09-10 2005-03-10 Mazen Chmaytelli Wireless communications services pay plan customizer and notifier
US6920319B2 (en) 2000-05-05 2005-07-19 Axis Ab Method and apparatus for a mobile access system delivering location based information and services
US20060031399A1 (en) 2004-06-30 2006-02-09 Bellsouth Intellectual Property Corporation Methods and systems for remotely securing data in a wireless device in a communications network
US7010002B2 (en) 2001-06-14 2006-03-07 At&T Corp. Broadband network with enterprise wireless communication method for residential and business environment
US20060223495A1 (en) * 2005-03-14 2006-10-05 Cassett Tia M Method and apparatus for monitoring usage patterns of a wireless device
US20080319808A1 (en) * 2004-02-17 2008-12-25 Wofford Victoria A Travel Monitoring

Patent Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6308053B1 (en) 1997-06-19 2001-10-23 Byard G. Nilsson Recyclable wireless telephone unit with a secured activation switch
US20010044325A1 (en) * 1998-04-29 2001-11-22 Metro One Telecommunications, Inc. Telephone call management system and method
US6256515B1 (en) 1998-04-29 2001-07-03 Metro One Telecommunications, Inc. Call management system for wireless telephones
US6308067B1 (en) 1999-11-30 2001-10-23 At&T Corp. Wireless communications system and method of operation for reducing fraud
US6920319B2 (en) 2000-05-05 2005-07-19 Axis Ab Method and apparatus for a mobile access system delivering location based information and services
US6687496B1 (en) 2000-08-02 2004-02-03 Intel Corporation Memory programming method and system
US20020154751A1 (en) * 2000-10-18 2002-10-24 Thompson Richard H. Method for managing wireless communication device use including optimizing rate and service plan selection
US20020081995A1 (en) 2000-12-21 2002-06-27 Mika Leppinen Secure wireless backup mechanism
US7010002B2 (en) 2001-06-14 2006-03-07 At&T Corp. Broadband network with enterprise wireless communication method for residential and business environment
US6847970B2 (en) 2002-09-11 2005-01-25 International Business Machines Corporation Methods and apparatus for managing dependencies in distributed systems
US20040063463A1 (en) 2002-09-30 2004-04-01 Roger Boivin Multiple piece wireless phone
US20040067747A1 (en) * 2002-10-02 2004-04-08 Carpenter Ronald Vaiden Method for managing wireless telecommunications bills
US20050041648A1 (en) 2003-08-18 2005-02-24 Nortel Networks Limited Method and system for service denial and termination on a wireless network
US20050054324A1 (en) 2003-09-10 2005-03-10 Mazen Chmaytelli Wireless communications services pay plan customizer and notifier
US20080319808A1 (en) * 2004-02-17 2008-12-25 Wofford Victoria A Travel Monitoring
US20060031399A1 (en) 2004-06-30 2006-02-09 Bellsouth Intellectual Property Corporation Methods and systems for remotely securing data in a wireless device in a communications network
US20060223495A1 (en) * 2005-03-14 2006-10-05 Cassett Tia M Method and apparatus for monitoring usage patterns of a wireless device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"Asset Tracking System for Networked or Networkable Assets". IBM Research Disclosure Article #456171, Apr. 2002, p. 692.

Also Published As

Publication number Publication date
US20080254763A1 (en) 2008-10-16

Similar Documents

Publication Publication Date Title
US8688586B2 (en) End-to-end licensing of digital media assets
EP2033123B1 (en) Platform for managing mobile domains and keyword-activated applications
US8301113B2 (en) Method for managing wireless devices using exception monitoring
US20040230650A1 (en) System and method for managing conversations
Tsavli et al. Reengineering the user: privacy concerns about personal data on smartphones
KR20080029943A (en) An event update management system
RU2576495C2 (en) System and method for global directory service
US20190180384A1 (en) Methods and systems for setting and sending reminders
JP2013235496A (en) Cloud storage server
US20140351043A1 (en) System and Method to Build External Facing Information Platform to Generate Target List of Entities
Sambasivan et al. Understanding negotiation in airtime sharing in low-income microenterprises
CN109636356B (en) Novel project material informatization review platform
KR101056551B1 (en) Management service system for providing of mail and personal information and method thereof
US8170530B2 (en) Managing wireless devices using access control
Singanamalla et al. Telechain: Bridging telecom policy and blockchain practice
EP1739607A1 (en) System and method for customer support
KR101669659B1 (en) Method of telephone counseling to prevent exposure of private phone number
JP5592332B2 (en) Application usage management system
Yu Data privacy and big data-compliance issues and considerations
CN104077639A (en) Electronic book reading business ordering implementation method and system
KR20090120747A (en) A sharing system of tax accounting and a method thereby
US10192212B1 (en) Prepaid transaction history record synchronization on a mobile communication device
CN102333147A (en) Method for exchanging personal related information based on ID (identification) information and verification information
JP3200006U (en) Business email with industry-specific advertising
Sørensen Portfolios—Amplified Mobility

Legal Events

Date Code Title Description
AS Assignment

Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BRINK, KENNETH A., JR.;JOHNSON, RANDY S.;MALKOWSKI, RAYMOND T.;AND OTHERS;REEL/FRAME:019201/0499

Effective date: 20070405

REMI Maintenance fee reminder mailed
LAPS Lapse for failure to pay maintenance fees
STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20161030